Pass the Paloalto Networks Network Security Administrator PCNSA Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which situation is recorded as a system log?

Options:

A.

An attempt to access a spoofed website has been blocked.


B.

A connection with an authentication server has been dropped.


C.

A file that has been analyzed is potentially dangerous for the system.


D.

A new asset has been discovered on the network.


Expert Solution
Questions # 82:

When is the content inspection performed in the packet flow process?

Options:

A.

after the application has been identified


B.

after the SSL Proxy re-encrypts the packet


C.

before the packet forwarding process


D.

before session lookup


Expert Solution
Questions # 83:

Which feature enables an administrator to review the Security policy rule base for unused rules?

Options:

A.

Test Policy Match


B.

Policy Optimizer


C.

View Rulebase as Groups


D.

Security policy tags eb


Expert Solution
Questions # 84:

Which license is required to use the Palo Alto Networks built-in IP address EDLs?

Options:

A.

DNS Security


B.

Threat Prevention


C.

WildFire


D.

SD-Wan


Expert Solution
Questions # 85:

Which rule type is appropriate for matching traffic both within and between the source and destination zones?

Options:

A.

interzone


B.

shadowed


C.

intrazone


D.

universal


Expert Solution
Questions # 86:

What are two valid selections within an Anti-Spyware profile? (Choose two.)

Options:

A.

Default


B.

Deny


C.

Random early drop


D.

Drop


Expert Solution
Questions # 87:

Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability exploits on a Palo Alto Networks Firewall?

Question # 87

Options:

A.

Signature Matching


B.

Network Processing


C.

Security Processing


D.

Security Matching


Expert Solution
Questions # 88:

Which dynamic update type includes updated anti-spyware signatures?

Options:

A.

Applications and Threats


B.

GlobalProtect Data File


C.

Antivirus


D.

PAN-DB


Expert Solution
Questions # 89:

In which two Security Profiles can an action equal to the block IP feature be configured? (Choose two.)

Options:

A.

URL Filtering


B.

Vulnerability Protection


C.

Antivirus b


D.

Anti-spyware


Expert Solution
Questions # 90:

If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how should a Security policy with App-ID be configured?

A)

Question # 90

B)

Question # 90

C)

Question # 90

D)

Question # 90

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions